轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202512-00000005
[內容說明]
【CVE-2025-42928,CVSS:9.1】 此漏洞為反序列化漏洞,具備高權限的使用者可能利用此漏洞,觸發遠端程式碼執行攻擊,影響系統的機密性、完整性和可用性。
【CVE-2025-42880,CVSS:9.9】 由於缺乏輸入過濾機制,SAP Solution Manager允許已驗證的攻擊者在呼叫支援遠端的功能模組時植入惡意程式碼,可能影響系統的機密性、完整性和可用性。
[影響平台]
【CVE-2025-42928】 SAP jConnect - SDK for ASE SYBASE_SOFTWARE_DEVELOPER_KIT 16.0.4, 16.1版本
【CVE-2025-42880】 SAP Solution Manager ST 720版本
[建議措施]
根據官方網站釋出的解決方式進行修補: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/december-2025.html
Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202512-00000005
[Content Description]
【CVE-2025-42928, CVSS: 9.1】 This vulnerability is a deserialization vulnerability. A user with high privileges could exploit this vulnerability to trigger a remote code execution attack, affecting the confidentiality, integrity, and availability of the system.
【CVE-2025-42880, CVSS: 9.9】 Due to the lack of input filtering mechanisms, SAP Solution Manager allows a verified attacker to inject malicious code when calling remote support function modules, potentially affecting the confidentiality, integrity, and availability of the system.
[Affected Platforms]
【CVE-2025-42928】 SAP jConnect - SDK for ASE SYBASE_SOFTWARE_DEVELOPER_KIT 16.0.4, 16.1 versions
【CVE-2025-42880】 SAP Solution Manager ST version 720
[Recommended Actions]
Patch according to the solutions released on the official website: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/december-2025.html